Alexandre Maravilla Digital Identity Wallets against identity theft fraud Identity theft or impersonation is a type of fraud in which criminals manage to supplant the identity of the person being deceived, based on the theft of their personal...
Telefónica Tech Cyber Security Weekly Briefing 29 January – 4 February Exploits that allow privilege elevation in Windows published Security researchers have made public several exploits that leverage a known elevation of privilege vulnerability that affects all versions of Windows 10. The exploits...
Telefónica Tech Cyber Security Weekly Briefing 22-28 January New vulnerabilities in Linux Two new vulnerabilities of risk have recently been disclosed and are reportedly affecting Linux systems. If exploited, they could allow privilege escalation on the vulnerable system. CVE-2021-4034...
Martiniano Mallavibarrena Are we really shopping ” securely ” on the Internet? Once Black Friday, Singles’ Day (if you have Chinese roots or any kind of relationship to it) and Christmas are over, I’m sure the vast majority of us have...
Susana Alwasity The risks of not having controlled exposure to information (III) Finally comes the last and long-awaited post in this series on the risks of uncontrolled information overexposure. As we saw in the previous post, we know how to minimise...
Paloma Recuero de los Santos IoT and Big Data: What’s the link? The digital revolution has changed our lives. To begin with, technological advances were linked to the worlds of scientific research, industrial innovation, the space race, defence, health, private companies...
Telefónica Tech Cyber Security Weekly Briefing 15–21 january Cyber-attack campaign against Ukrainian targets The Microsoft Threat Intelligence Center team has been analysing the succession of cyberattacks against Ukrainian organisations since 13 January, which have affected at least 15 government institutions...
Santiago Morante Cendrero Deep Learning in Star Wars: May Computation Be With You Today we are going to talk about how Artificial Intelligence and, Deep Learning in particular, are being used in the filming of movies and series, achieving better results in...
Telefónica Tech Cyber Security Weekly Briefing 8–14 january Microsoft security bulletin Microsoft has published its January security bulletin in which it has fixed a total of 97 bugs, including six 0-day vulnerabilities and nine bugs classified as critical....
Susana Alwasity The risks of not having controlled exposure to information (I) Welcome to the digital era. This is an era in which we embrace technology, with what it offers us in almost every sphere of our lives. From carrying a...
Florence Broderick Evil FOCA is now Open Source We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick FOCA Final Version, the ultimate FOCA You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Florence Broderick Latch, new ElevenPaths' service During the time we’ve been working in ElevenPaths we’ve faced many kind of events internally, buy one of the most exciting and awaited is the birth of Latch. It’s a technology of our...
Florence Broderick HookMe, a tool for intercepting communications with API hooking HookMe is a tool for Windows that allows to intercept system processes when calling APIs needed for network connections. The tool, still in beta, was developed by Manuel Fernández (now...
Florence Broderick How does blacklisting work in Java and how to take advantage of it (using whitelisting) Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...